Skip to main content

Posts

Showing posts from September 20, 2020

Do You Know What is a SWOT Analysis? Why It's Important to be in Successful life?

As we are always talking about networking and Database related talk but today we are going to discuss about one more important thing which is helpful to being successful in your carrier. So lets move ahead and discuss exactly what it is and why it's important. So we are going to discuss about SWOT Analysis. S - Strengths W - Weakness O - Opportunities T - Threats What Is SWOT Analysis? SWOT (strengths, weaknesses, opportunities, and threats) analysis is a framework used to evaluate a  company's competitive position  and to develop strategic planning. SWOT analysis assesses internal and external factors, as well as current and future potential. A SWOT analysis is designed to facilitate a realistic, fact-based, data-driven look at the strengths and weaknesses of an organization, its initiatives, or an industry. The organization needs to keep the analysis accurate by avoiding pre-conceived beliefs or gray areas and instead focusing on real-life contexts...

Do You Know Name Server?

If you manage your own website, you may have run across the term “nameserver”. However, you might not have any real understanding of what one is or how it works. As it turns out, knowing a little about this concept can come in handy for managing your site. When a user enters a URL in their browser, like “www.netwyman.com, there needs to be some way to connect that URL with the underlying web server that powers the website at that domain name. A name server is a specialized server on the Internet that handles queries or questions from your local computer, about the location of a domain name’s various services. A great simple way to think about name servers is using a phone book analogy. If you were trying to call InMotion Hosting you might have remembered our phone number, but more than likely you’d want to look it up before just guessing at numbers. Introduction to Nameservers Nameservers are put to work every time someone accesses a website, but many people have very l...

Do You Know How is ICMP used in DDoS attacks?

As we have already seen that What ICMP is with our previous bug, if you still do not read at just click on ICMP . How is ICMP used in DDoS attacks? ICMP flood attack A ping flood or ICMP flood is when the attacker attempts to overwhelm a targeted device with ICMP echo-request packets. The target has to process and respond to each packet, consuming its computing resources until legitimate users cannot receive service. Ping of death attack A ping of death attack is when the attacker sends a ping larger than the maximum allowable size for a packet to a targeted machine, causing the machine to freeze or crash. The packet gets fragmented on the way to its target, but when the target reassembles the packet into its original maximum-exceeding size, the size of the packet causes a buffer overflow. The ping of death attack is largely historical at this point. However, older networking equipment could still be susceptible to it. Smurf attack In a Smurf attack, the attac...